Defense against adversarial attack in image recognition
Deep neural networks were found to be extremely useful and perform exceedingly well in machine learning tasks such as computer vision, speech recognition, natural language processing and in various domains such as healthcare system and autonomous car system. The high accuracy exhibited by the deep l...
| Main Author: | Ng, Shi Qi |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2024
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/6989/ http://eprints.utar.edu.my/6989/1/fyp_CS_2024_NSQ.pdf |
Similar Items
Robustness of frequency domain image watermarking against image processing attacks
by: Chai, Jee Sing
Published: (2008)
by: Chai, Jee Sing
Published: (2008)
Lightweight generative adversarial network fundus image synthesis
by: Nurhakimah, Abd Aziz, et al.
Published: (2022)
by: Nurhakimah, Abd Aziz, et al.
Published: (2022)
Performance comparison between generative adversarial networks (GAN) variants in generating comic character images.
by: Tan, Jia Ler
Published: (2024)
by: Tan, Jia Ler
Published: (2024)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Robust blind watermarking technique against geometric attacks for fingerprint image using DTCWT-DCT
by: Lebcir, Mohamed, et al.
Published: (2020)
by: Lebcir, Mohamed, et al.
Published: (2020)
Distributed defense scheme for managing DNS reflection attack in network communication systems
by: Ahmed, Dana Hasan, et al.
Published: (2016)
by: Ahmed, Dana Hasan, et al.
Published: (2016)
Protecting DNS from reflection amplification attacks using distributed defense scheme
by: Ahmed, Dana Hasan
Published: (2017)
by: Ahmed, Dana Hasan
Published: (2017)
Public infrastructure procurement: A review of adversarial and non-adversarial contracting methods
by: Regan, M., et al.
Published: (2015)
by: Regan, M., et al.
Published: (2015)
Between the adversarial and the inquisitorial trial
by: Kamarudin, Abdul Rani
Published: (2007)
by: Kamarudin, Abdul Rani
Published: (2007)
Between the adversarial and the inquisitorial trial
by: Kamarudin, Abdul Rani
Published: (2006)
by: Kamarudin, Abdul Rani
Published: (2006)
Exploiting the Generative Adversarial Network Approach to Create a Synthetic Topography Corneal Image
by: Samer Kais, Jameel, et al.
Published: (2022)
by: Samer Kais, Jameel, et al.
Published: (2022)
Enhanced Conditional Generative Adversarial Network For Handling Subject Variability In Human Activity Recognition
by: Jimale, Ali Olow
Published: (2023)
by: Jimale, Ali Olow
Published: (2023)
The right of private defense against non-accountable offenders and in defense of the chastity of women under Islamic law
by: Owaydhah, Khalid A., et al.
Published: (2017)
by: Owaydhah, Khalid A., et al.
Published: (2017)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Dispute resolution: adversarial system and inquisitorial system
by: Ali Mohamed, Ashgar Ali, et al.
Published: (2020)
by: Ali Mohamed, Ashgar Ali, et al.
Published: (2020)
A robust digital image watermarking using repetition codes
against common attacks
by: Hassan, Abdullahi Mohamud
Published: (2015)
by: Hassan, Abdullahi Mohamud
Published: (2015)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Performance of image watermarking algorithm using RSA with Fibonacci transform against attacks
by: Mahad, Zahari, et al.
Published: (2023)
by: Mahad, Zahari, et al.
Published: (2023)
Shells of coconut and their durability against termite attack
by: Manuel, Daß, et al.
Published: (2015)
by: Manuel, Daß, et al.
Published: (2015)
Generative adversarial networks in object detection: A systematic literature review
by: Anis Farihan, Mat Raffei, et al.
Published: (2025)
by: Anis Farihan, Mat Raffei, et al.
Published: (2025)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
Presentation attack detection for face recognition on smartphones: a comprehensive review
by: Abdul Ghaffar, Idris, et al.
Published: (2017)
by: Abdul Ghaffar, Idris, et al.
Published: (2017)
Integrated Generative Adversarial Networks and Deep Convolutional Neural Networks for Image Data Classification A Case Study for COVID-19
by: Ku Muhammad Naim, Ku Khalif, et al.
Published: (2024)
by: Ku Muhammad Naim, Ku Khalif, et al.
Published: (2024)
Abnormal Transactions Detection In The Ethereum Network Using Semi-Supervised Generative Adversarial Networks
by: Mahmoud Al-Emari, Salam Radi
Published: (2022)
by: Mahmoud Al-Emari, Salam Radi
Published: (2022)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis
by: Chen, Li
Published: (2024)
by: Chen, Li
Published: (2024)
Single-View Food Portion Estimation: Learning Image-to-Energy Mappings Using Generative Adversarial Networks
by: Fang, S., et al.
Published: (2018)
by: Fang, S., et al.
Published: (2018)
The prices of access to justice : adversarial costs in public interest litigation
by: Mohamed Abdullah, Abu Haniffa, et al.
Published: (2011)
by: Mohamed Abdullah, Abu Haniffa, et al.
Published: (2011)
Generative Adversarial Network (Generative Artificial Intelligence) in Pediatric Radiology: A Systematic Review
by: Ng, Curtise
Published: (2023)
by: Ng, Curtise
Published: (2023)
Link-based spam algorithms in adversarial information retrieval
by: Leng, A., et al.
Published: (2012)
by: Leng, A., et al.
Published: (2012)
Blind motion image deblurring using canny edge detector with generative adversarial networks / Idriss Moussa Idriss
by: Idriss Moussa , Idriss
Published: (2021)
by: Idriss Moussa , Idriss
Published: (2021)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Identification and molecular characterisation of vascular-related defense genes against papaya dieback disease
by: Hamid, Muhammad Hanam
Published: (2017)
by: Hamid, Muhammad Hanam
Published: (2017)
Transcriptional regulatory mechanism of early defense response of oil palm against Ganoderma boninense
by: Abdul Bahari, Mohammad Nazri, et al.
Published: (2017)
by: Abdul Bahari, Mohammad Nazri, et al.
Published: (2017)
In defense of (extreme) monism
by: Garner, Jeremy
Published: (2016)
by: Garner, Jeremy
Published: (2016)
Imagining the 'Enemy': adversarial roles in Rabindranath Tagore's short stories
by: Quayum, Mohammad Abdul
Published: (2016)
by: Quayum, Mohammad Abdul
Published: (2016)
Adversarial, ludic and ritual nature of discursive interactions in a trial
by: Boginskaya, Olga
Published: (2022)
by: Boginskaya, Olga
Published: (2022)
PGPM-induced defense-related enzymes in aerobic rice against rice leaf blast caused by Pyricularia aryzae
by: Ng, Lee Chuen, et al.
Published: (2016)
by: Ng, Lee Chuen, et al.
Published: (2016)
Similar Items
-
Robustness of frequency domain image watermarking against image processing attacks
by: Chai, Jee Sing
Published: (2008) -
Lightweight generative adversarial network fundus image synthesis
by: Nurhakimah, Abd Aziz, et al.
Published: (2022) -
Performance comparison between generative adversarial networks (GAN) variants in generating comic character images.
by: Tan, Jia Ler
Published: (2024) -
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006) -
Robust blind watermarking technique against geometric attacks for fingerprint image using DTCWT-DCT
by: Lebcir, Mohamed, et al.
Published: (2020)